5 Simple Steps to Protect Your Car from Theft or Vandalism

Written by Administrator. Posted in Security Tips


As the mercury in the thermometer climbs it seems like reports of petty crimes involving vehicles climb with it. It’s also the time of year when the summer rush causes us to forget the most basic common sense approach to keeping our car and items inside safe. But all it takes is a few minutes to stop and think about these 5 ways to keep your car safe and not start your summer off with a police report:

1. Lock the doors. If you don’t have a keychain remote with a convenient button that locks all the doors just take the time to check. Also make sure your sun roof, moon roof, and windows are rolled up and closed. Don’t make it easy to reach into an unlocked car and take a handful of CDS, a Bluetooth speaker or even a handful of change. Even if you run into a store for just two seconds, leaving the car running or unlocked is asking for trouble. Although keyless entry makes your car a little more secure, in the event you forget all of this lock-it-up advice, invest in a GPS tracker. In the worst case scenario, you can track your car in real time until the police get there.

2. Keep valuables out of sight. Your GPS navigation unit is great, you may want to hold on to it. If it’s a portable navigation system, place it in the glove box, center console or the trunk. The same goes for any item that is not mounted to something. Let’s be honest, your purse is not safe tucked under the seat. It’s safe in the locked trunk.

3. Park in well-lit areas. Even if you have to walk a little farther you should park where your car is safe. Petty thieves are looking for an easy target and a car sitting in a well lit area is not it. Good lighting also makes it easier for criminal activity to be recorded by nearby security cameras.

4. Don’t advertise the nice stuff you keep in the car. Don’t give your neighbors a chance to talk about your new stereo system by playing it loudly. You never know who might be listening. The same goes for advertising the kind of phone you have by placing its logo on your back window. You might as well say, “yep, I have an expensive phone, want to take a look?”

5. Put a hidden camera in or near your car. This way even if someone does break in you will have a video record of it. Hidden cameras like the Cell Phone Holder Camera are less likely to be stolen. It looks like a typical, cheap, dash-mounted plastic phone holder but it will capture the the person who decides to root around in your unlocked car. Another possibility is the Car Charger Hidden Camera. It’s not only great for catching criminals who stop by your driveway at night it’s also an easy way to find out if your mechanic really did swipe the change out of your console.

4 Ways to Stay Safe at Summer Festivals

Written by Administrator. Posted in Security Tips


Since the days of Woodstock, attending summer music festivals has been and continues to be one of America’s favorite summer activities. Every year a new summer music festival is added to the fabulous list around the country. Haven’t chosen your summer music festival yet? Elle Magazine has put together a great list of festivals around the country.
This year at most of the summer festivals you find the hottest bands- think The Weekend, Muse, Chance the Rapper, etc. You’ll also find, as you do every year, very big crowds of smelly people- young and old. In fact, you can find KJB Security’s very own president and her family at the Bonaroo Music Festival just outside of Nashville almost every year!
At KJB Security, Inc., our focus is alway on helping you protect what matters and keeping you KJB Safe! So we’ve come up with a few tips to help you or your loved one stay safe at summer festivals!
Stay safe by knowing your locations.
There are a few important locations that you should figure out as soon as you arrive and get set up. The first is a spot that is easy to find in case your group gets separated. The best place would be a landmark that can be seen from anywhere in the area. The second is the location of the medical tent in case of emergency! In general, it’s a good idea for you and your friends to be aware of your surroundings at all times.
Stay safe with GPS Tracking
Send your teen or college student off to the summer music festival this year with our iTrail GPS tracking device. Our iTrail Solo has a 14 hour battery life and can easily fit into your purse or backpack. You will receive location updates every 30 or 60 seconds. The best part? You can know when your tracker has left a specified area using our GeoFence alerts sent to your device!
Stay safe using the buddy system
Having a friend with you at all times will help you stay safe. It will also increase the likelihood of finding your way back to your tent or home base if you get lost! There are so many potential issues you can run into at summer festivals. Your friends can help keep you out of trouble and into having fun!
Stay safe by staying healthy!  
There are just a few things to remember to stay safe in the hot summer sun at an outdoor festival.
  • Have lots of water on hand
  • Have lots of sunscreen on hand
  • Don’t over do it on the alcohol!
  • Don’t forget to eat!

$12 Million Jury Verdict in Nursing Home Abuse Case

Written by Administrator. Posted in Security Tips

In a shocking video that was shown to the jury at trial, two nursing home aides appeared to stuff a latex glove into the mouth of a 96-year-old nursing home resident. The resident was sitting in a wheelchair. The undercover video helped change laws in many states. Families can legally hide cameras inside their loved one’s room.

See original article here

Buy Cameras To Catch Nursing Home Abuse Here: Granny Cams

Safety With Stun Guns – What You Need to Know After You Buy A Stun Gun Online

Written by Administrator. Posted in Product FAQs, Security Tips

Not Sure which Stun Gun is Right for you?  See Our Online Buyer’s Guide Here: Stun Gun Buying Guide

photo of Multi Action Stungun SM-Multi

Stun guns are small electrical devices that provide personal protection for those who carry them. They are non-lethal under most circumstances and are often carried by both men and women who want an extra measure of protection when they are alone.

In areas where stun guns are legal, there are generally no licensing requirements and no courses are offered in stun gun safety. This makes it important for each stun gun owner to take the time to familiarize themselves with the way stun guns work and how they should handle their stun gun for the most effective personal protection.

The first thing to do when a stun gun is purchased is to look over the device itself to become familiar with the important components. The button that activates the electric current should be located as well as the two contact probes that dispense this current. The probes are what will be held against an attacker in order to deliver the shock to them. Knowing exactly where they are will prevent the stun gun owner from accidentally shocking themselves when using it or testing it. Be sure to stay away from the contact probes, never touching them in order to avoid an accident.

Once these key parts are identified, the owner should make sure that the battery has enough power. Testing the stun gun periodically by holding it in the air and pushing the button will let the owner know whether the battery is still good. Having a stun gun with a dead battery can be dangerous for those who count on their stun guns for protection.

If a situation arises that calls for the use of the stun gun against an assailant, the stun gun must be close at hand in order to grab it quickly and use it. Plan out a place to keep it for just this type of emergency. Keeping it in a pocket or held onto the wrist with a strap will keep it close by. In a real emergency, there will be no time to dig through a bag to find the stun gun and prevent someone from committing violence.

Before discharging the electric current, make sure that your fingers or any other part of your body are not in contact with the current probes. The object is to shock the other person to allow the stun gun holder to get away. If both parties are shocked, the stun gun user may not get away safely.

The assailant holding on to the stun gun owner does not mean that the current will pass through both parties. Only direct contact with the probes will cause a shock. If the stun gun owners can’t shock the assailant without shocking themselves, they should wait for an opportune moment to do so instead of risking a shock to themselves. Some owners have scared away attackers simply by holding their stun guns in the air and activating the current. This may work in a situation where the attacker can’t be reached with the stun gun.


Are you more of a pepper spray person?  If so, see our complete article on how to handle and use pepper spray properly against attackers.



Stun Guns in the News:


Portland police seek to replace Taser stun guns with newer

The bureau whose officers came under federal scrutiny in 2012 for a pattern of unwarranted use of stun guns has used a Taser model X26 since 2005 but the company discontinued making them at the end of last year.…


Slay Enemies with a Cell Phone Stun Gun and Tactical

This cell phone-looking stun gun delivers 1,000,000 volts of lightning protection at the push of a button. Includes safety button extra-bright LED flashlight and case with belt clip. Requires three CR2 batteries included.…


Concealed Weapons Police Need to Know About – Places to Hide

Written by Administrator. Posted in Security Tips

How to search for and find concealed weapons – Places to Hide


Looking for concealed weapons means being thorough.  Here are some of the ways they may think they can fool you.


1. Jamaican Holster – Made from thin metal like a coat hanger


Jamaican Holster Image


Image of a Jamaican Holster Picture in Pants

2. The Headrest Compartment

The FBI is finding more and more of these compartments, where the back of the headrest flips open like a glove box.  Most handguns can fit inside.

Image of Headrest Compartment for Concealing Illegal Substances

3. Hidden Compartments

A kidnap victim pointed out this hidden compartment below in a 2000 Cadillac Seville STS.  The gun was found in a compartment that was revealed by pushing down on the tilt steering wheel adjuster.

Image of Hidden Compartment behind steering wheel tilt

Other hiding spots include:

Image of Video recorder gun safe


Image of a Video recorder gun safe open

Image Cut to Hide Gun


Image of Pepsi Machine Gun Storage

Image of Hollowed out car battery with hidden release mechanism.

3. Book Bombs

On Sept 10, 2001, Colombian National Police discovered this book.  It was to have been used to assassinate a prominent presidential candidate.  5 Lbs of plastic explosives were found inside that could be detonated via remote control or cell phone.

book bomb picture


4. Shot Gun Shell Booby Traps

During a drug investigation in Tillonsburg, England, 3 of these traps were found protecting a marijuana patch.   The barrels were directed at the ground, but could be aimed to injure or kill those who activated the trip wires.

image of shotgun booby trap


shotgun booby trap-2


This last example shows how staying vigilant not only gets more contraband off the streets, but also may save your life.


Do you have a story of your own you would like to share?  Post it in the comments below.  You just may help someone else who finds themselves in the same circumstance later on.


Don’t forget to check out our surveillance equipment for police interrogation rooms. Many of the custom built cameras can have audio added if the products are built for Law Enforcement.




Concealed Weapons Police Should Know About – Knives and Blades

Written by Administrator. Posted in Security Tips

Part II of our series on concealed weapons – Knives and Blades

Cat Hands:

Sold as self defense weapons:


Key Knives


  • Several on the market, sold at self defense stores, hardware stores, gas stations, and novelty stores
  • Very realistic looking and could be overlooked
  • Usually the blades are surgical steel and razor sharp
  • The “Swiss-Tech Utili-Key” has half straight and half serrated edge.


1 Inch Knife Blade:



A Standard Ballpoint pen casing hiding a 2 5/8″ surgical steel blade, serrated towards the handle. Modified from a Parker ballpoint pen and still writes as a pen.


A Letter Opener:


A Walking Cane Dagger:

Contains both a 5″ and 18″ blade. 


Baton Blade (Holds 2 Double Edged Swords)


Throwing Cards


Lighter Knife:

Several models, usually sold at tobacco shops

Works “stilletto style”

Polymer Knife – No Metal


 Calculator Knife:


 Lipstick Knife

Hair Brush Dagger – Poly-Resin Blade

Bike Seat Dagger – You may not know its there:


See our next article on Places to Hide Concealed Weapons.


If you are looking to buy concealed cameras click here



Concealed Weapons Police Should Know About – Homemade Guns

Written by Administrator. Posted in Security Tips

Everyday items can be modified to be used as weapons.

Some are devised by the bad guys.
ALWAYS remember ~ many criminals are smarter than we think. NEVER underestimate the ones who were “dumb enough to get caught.”

Why should we worry?

Homemade Guns

Cell Phone Guns

  • Several types have been found.
  • Several of this model have been confiscated in Holland recently, usually along with high volumes of explosives and narcotics.
  • Fires 4 .22 caliber ‘short’ rounds by pressing the keypad buttons…

Pictures of Cell Phone Guns


FlashLight Shotgun.

Flashlight Shotgun

The “Companion,” a 3 D-cell Mag-Lite flashlight converted into a shotgun capable of firing a .410 shotgun round. Manufactured by Ares Defense Systems. May be purchased on the Internet.Fully functional as a flashlight, it also works as a gun by pulling the safety pin, then pushing down on a spring-loaded firing pin. The projectile is discharged through the end cap of the flashlight. The company also sells a Mini-Mag-Lite (next slide). The items are covered by the National Firearms Act and possessing them requires you to have proper documentation of ownership.

Mini-Maglite Gun

  • 4” mini-mag flashlight (2 AA battery size)
  • Fires a single .380 round
  • Has an optional end cap that makes it look like a mini kubotan, vs. a flashlight

Image of Maglight gun


  • Used by fishermen and scuba divers to kill sharks and alligators.
  • Fires a single 38 caliber short Colt, .38 special or .357 magnum cartridge.
  • Considered to be a firearm when carried in a pocket or around the neck and used for other purposes.

Image of Bangstick

Folding Gun

  • A 5-shot .22 caliber pistol with a grip that folds over the barrel and cylinder
  • was concealed inside an eyeglass case when discovered
  • fits in pockets, hats, etc.

folding gun


World’s Smallest Gun

  • Fires .45 ACP, .357 Magnum, or .38 Special rounds
  • A break-down, single-shot, double action weapon made by Downsizer Corp.
  • 3 ¼” long, 2 ¼” tall, and .90” thick.
  • Imagine where this could be hidden…wallet, cigarette pack, palm, hats, etc., etc….

worlds smallest gun


Hunting Knife Guns

  • This is a 6-shot .22 caliber ‘pistol’
  • Cylinder and firing mechanisms are concealed inside the handle.
  • The handle breaks down and ‘ejects’ what becomes the grip and trigger
  • Fairly accurate for firing due to it’s overall length

Hunting Knife Gun


Pistol Pen

  • Just under 6” with a 2” barrel
  • “Stinger” model must be folded in half to fire, forms a handle to grip
  • .25 caliber, .22 LR, or .380ACP

Pistol Pen


Zip Guns

Some of the most commonly improvised firearms.

A handgun round is inserted snugly into a small diameter tube. That ‘loaded’ tube is then inserted into a larger pipe, which has an end cap with a piece of pointed metal inside it. When you slam the end cap back against a hard surface, the pointed metal strikes the primer of the round like a firing pin and discharges the weapon.

Zip Gun


 Bolt Gun

  • Fires a single .22 caliber Stinger. Pull back on spring-loaded hex head to fire.
  • 5/8″ diameter, 4″ long.

Bolt Gun


The Club Shotgun

  •  The handle end of The Club has been hollowed out to act as a barrel
  • When the lock end is pulled back, the interior metal cap (altered to act as a firing pin)
    is pulled away from the round
  • Fired by slamming the ends back together

The Club Shotgun


The Screwdriver Gun

The Screwdriver gun


The Pressure Gauge Weapon

  • Converted into .22 caliber pistol
  • Does not have plastic measuring device in the center
  • Last 1½ ” is a hardened steel barrel
  • To fire, remove threaded top, drop in cartridge. Pull the top and let go. Spring-loaded action, just like a zip gun.
  • ATF says possession is a federal crime, regardless of a person’s record.

Pressure gauge weapon


Next Up: Part 2 – Concealed Weapons Police Should Know About – Knives and Blades


You can purchase GPS and Police Hidden Surveillance Systems at  StunGunMikes.com.


Snake Bites, Venom, and Stun Guns. Do Stunguns Prevent the Flow of Venom?

Written by Administrator. Posted in Security Tips

Active Stun Gun Image

There have been reports that venomous bites can be treated by purchasing a stun gun.  We’ve all seen movies where the hero burns a wound or tries to suck out poison from a wound and then moves on to get the bad guy.  Unfortunately, these things do not always work when tested in reality.  To answer this question, we have sourced a paragraph from the national institute of health, which reads:

“During the past 2 decades, articles suggesting that stun guns be utilized to treat venomous bites and stings have appeared in both the lay and medical press. Although never widely considered to be standard therapy for venomous bites and stings, stun guns are still considered to be a treatment option by some medical practitioners and outdoor enthusiasts. A Medline search was performed using these terms: venomous bites, venomous stings, snake bites, spider bites, electrical, stun gun, high voltage electricity, low amperage electricity, direct current, and shock therapy. Articles selected included laboratory-based isolated venom studies, animal studies, and case reports involving humans in which a stun gun or some other source of high voltage, low amperage direct current electric shocks were used to treat actual or simulated venomous bites or stings. We concluded that the use of stun guns or other sources of high voltage, low amperage direct current electric shocks to treat venomous bites and stings is not supported by the literature.”


There are numerous articles on this subject which can be seen here: Snake Bites, Venom, and Stun Guns.

Although buying stun guns can save your life, they are not the “panacea” of safety.  Awareness will always provide you with greater efficacy in protecting yourself and your loved ones.



How to Become a Spy – The Ten Commandments of Counterintelligence

Written by Administrator. Posted in Security Tips

A never-Ending Necessity – The Ten Commandments of Counterintelligence

Foreign Intelligence Service

The need for counterintelligence (CI) has not gone away, nor is it likely to.  The end of the Cold War has not even meant an end to the CI threat from the former Soviet Union.  The foreign intelligence service of the new democratic Russia, the Sluzhba Vneshney Razvedki Rossii (SVRR), has remained active against us.  It was the SVRR that took over the handling of Aldrich Ames from its predecessor, the KGB, in 1991.  It was the SVRR that ran CIA officer Harold James Nicholson against us from 1994 to 1996.  It was the SVRR that was handling FBI special agent Earl Pitts when he was arrested for espionage in 1996.  It was the SVRR that planted one of their listening devices in a conference room of the State Department in Washington in the summer of 1999.  And it was the SVRR that was handling FBI special agent Robert Hanssen when he was arrested on charges of espionage in February 2001.

The Russians are not alone.  There have been serious, well-publicized concerns about Chinese espionage in the United States.  The Department of Energy significantly increased security at its national laboratories last year in response to allegations that China had stolen US nuclear weapons secrets.

Paul Redmond, the former Associate Deputy Director of Operations for Counterintelligence at the CIA, told the House Permanent Select Committee on Intelligence in early 2000 that a total of at least 41 countries are trying to spy on the United States.  Besides mentioning Russia, China, and Cuba, he also cited several “friends,” including France, Greece, Indonesia, Israel, the Philippines, South Korea, and Taiwan.  He warned of a pervasive CI threat to the United States.

The United States, as the world’s only remaining superpower, will be the constant target of jealousies, resentments, rivalries, and challenges to its economic well-being, security, and leadership in the world.  This inevitably means that the United States will be the target of large-scale foreign espionage.

A Choice Assignment

When I joined the CIA, one of my first interim assignments was with the old CI Staff.  I found it fascinating.  I was assigned to write a history of the Rote Kapelle, the Soviet espionage network in Nazi-occupied Western Europe during World War II.

With its expanded computer power, NSA was breaking out the actual messages sent between the NKVD center in Moscow and the clandestine radios of the various cells in Western Europe.  Incredibly, these messages came to me.

There I was, a brand new junior officer, literally the first person in the CIA to see the day-to-day traffic from these life-and-death operations.  I was deeply affected by the fear, heroism, and drama in these messages.  Above all, I felt privileged to have been given such an opportunity.

Building on an earlier study of the Rote Kapelle by the CI Staff, I completed a draft several months later that incorporated the new material.  To my great surprise, this study was well received by my immediate superiors, and I was told that I was to be rewarded with a personal interview and congratulations from James Jesus Angleton, the legendary head of the CI Staff from 1954 to 1974.

Angleton’s office was on the second floor of the Original Headquarters Building.  I was first ushered into an outer office, where Angleton’s aides briefed me on how to conduct myself.  Then I went alone into the inner sanctum.

The room was dark, the curtains were drawn, and there was just one small lamp on Angleton’s desk.  I later heard that Angleton had eye trouble and that the light hurt his eyes, but I was convinced the real reason for the semidarkness was to add to his mystique.  It certainly worked on me!

I nervously briefed Angleton on my study, and he listened without interrupting, just nodding from time to time.  When I finished, he methodically attacked every one of my conclusions.  Didn’t I know the traffic was a deception?  Hadn’t it occurred to me that Leopold Trepper, the leader of the Rote Kapelle, was a German double?  He went on and on, getting further and further out.

Even I, as a brand new officer, could tell that this great mind, this CI genius, had lost it.  I thought he was around the bend.  It was one of the most bizarre experiences of my career.

When the meeting was over, I was glad to get out of there, and I vowed to myself that I would never go anywhere near CI again.  I did not keep that vow.  In my overseas assignments with the Agency, I found myself drawn toward Soviet CI operations.  Nothing seemed to quicken my pulse more, and I was delighted when I was called back to Headquarters in 1989 to join the new Counterintelligence Center (CIC) as Ted Price’s deputy.  When Ted moved upstairs in early 1991 to become the Associate Deputy Director for Operations, I was named chief of the Center.

Today, many years after that initial disagreeable encounter with CI, I find it hard to believe that it is actually my picture on the wall of the CIC conference room at CIA Headquarters, where the photos of all former CIA counterintelligence chiefs are displayed.  There I am, number seven in a row that begins with Angleton.

So, after a career that ended up being far more CI-oriented than I could ever have imagined, I would like to offer some personal observations in the form of “The Ten Commandments of Counterintelligence.”  I have chosen the form of commandments because I believe the basic rules of CI are immutable and should be scrupulously followed.  In my view, it makes little difference whether the adversary is the Russians, the Cubans, the East Germans, the Chinese, or someone else.  It likewise makes little difference whether we are talking about good CI practices in 1985 or in 2005.  Unfortunately, as I watch US CI today, I am increasingly concerned that the principles I consider fundamental to effective CI are not being followed as carefully and consistently as they should be.

These commandments were not handed down to me from a mountaintop, and I make no claim that they are inspired or even definitive.  They are simply the culmination, for what they are worth, of my experience.  They are intended primarily for my fellow practitioners in CI today, but also for any younger officers in the Intelligence Community (IC) who might someday want to join us.

The First Commandment:  Be Offensive

CI that is passive and defensive will fail.  We cannot hunker down in a defensive mode and wait for things to happen.  I believe we are spending far too much money on fences, safes, alarms, and other purely defensive measures to protect our secrets.  That is not how we have been hurt in recent years.  Spies have hurt us.  Our CI mindset should be relentlessly offensive.  We need to go after our CI adversaries.

Aggressive double agent (DA) operations are essential to any CI program, but not the predictable, hackneyed kind we have so often pursued.  We need to push our bright and imaginative people to produce clever new scenarios for controlled operations, and we need more of them.  The opposition services should be kept constantly off guard so that they never suspect that we have actually controlled the operations they believe they initiated from the beginning.  When the requirements, modus operandi, and personality objectives of the DA operation have been achieved, we should in a greater number of cases pitch the opposition case officer.  If only one out of 10 or 20 of these recruitments takes, it is worth it.  And CI professionals, of course, should not rely exclusively on their own efforts.  They should constantly prod their HUMINT colleagues to identify, target, and recruit officers from the opposition intelligence services.  The key to CI success is penetration.  For every American spy, there are several members of the opposition service who know who he or she is.  No matter what it takes, we have to have penetrations.

We should operate aggressively against the nontraditional as well as the traditional adversaries.  How many examples do we need of operations against Americans by so-called friendly countries to convince us that the old intelligence adage is correct:  there are friendly nations, but no friendly intelligence services. If we suspect for whatever reason that the operatives of a foreign intelligence service, friend or foe, are operating against us, we should test them.  We should dress up an enticing morsel, made to order for that specific target, and send it by them.  If they take it, we have learned something we needed to know, and we have an operation.  If they reject it, as true friends should, we have learned something, too.  In either event, because we are testing a “friend,” plausible deniability has to be strictly preserved.  Every foreign service is a potential nontraditional adversary; no service should get a lifetime pass from US offensive CI operations.

The Second Commandment:  Honor Your Professionals

It has been true for years—to varying degrees throughout the IC—that CI professionals have not been favored, to the extent they deserved, with promotions, assignments, awards, praise, esteem, or other recognition.  The truth is that CI officers are not popular.  They are not always welcome when they walk in.  They usually bring bad news.  They are easy marks to criticize when things go wrong.  Their successes are their failures.  If they catch a spy, they are roasted for having taken so long.  If they are not catching anyone, why not?  What have they done with all that money they spent on CI?  It is no-win.

For much of my career, many of our best people avoided becoming CI specialists.  CI was not prestigious.  It had a bad reputation.  It was not fast track.  It did not lead to promotions or good assignments.  Angleton left a distasteful legacy that for years discredited the CI profession.  Ted Price did more than anyone else in the Agency to reverse that trend and to rehabilitate CI as a respected professional discipline.

Nevertheless, that battle is still not completely won.  We have to do more to get our CI people promoted, recognized, and respected so that our best young officers will be attracted to follow us into what we know is a noble profession and where the need is so great.

The Third Commandment:  Own the Street

This is so fundamental to CI, but it is probably the least followed of the commandments.  Any CI program worthy of the name has to be able to engage the opposition on the street, the field of play for espionage.  And when we do go to the street, we have to be the best service there.  If we are beaten on the street, it is worse than not having been there at all.

For years, we virtually conceded the streets of the world’s capitals, including the major espionage centers, to the KGB, the GRU, and the East European services because we either did not know how to do it or we were not willing to pay the price for a thoroughly professional, reliable, full-time, local surveillance capability.

Opposition intelligence officers have to be watched, known meeting areas have to be observed, and, when an operation goes down—often on short notice—undetectable surveillance has to cover it, identify the participants, and obtain evidence.

This capability is expensive—selection, training, vehicles, photo gear, video, radios, other real spy equipment, safe apartments, observation posts, and on and on—but, if we do not have it, we will be a second-rate CI service and will not break the major cases.

The Fourth Commandment:  Know Your History

I am very discouraged when I talk to young CI officers today to find how little they know about the history of American CI.  CI is a difficult and dangerous discipline.  Many good, well-meaning CI people have gone wrong and made horrendous mistakes.  Their failures in most cases are well documented, but the lessons are lost if our officers do not read the CI literature.

I find it inconceivable that any CI practitioner today could ply his or her trade without an in-depth knowledge of the Angleton era.  Have our officers read Mangold?  Have they read Legend and Wilderness of Mirrors?  Do they know the Loginov case, HONETOL, MHCHAOS, Nosenko, Pollard, and Shadrin?  Are they familiar with Aspillaga and the Cuban DA debacle?  Have they examined our mistakes in the Ames and Howard cases?  Are they staying current with recent releases like The Mitrokhin Archive and The Haunted Wood?

I believe it is an indispensable part of the formation of any American CI officer—and certainly a professional obligation—to study the CI failures of the past, to reflect on them, and to make sure they are not repeated.

The many CI courses being offered now are a positive step, but there will never be a substitute for a personal commitment on the part of our CI professionals to read their history, usually on their own time at home.

The Fifth Commandment:  Do Not Ignore Analysis

Analysis has too often been the stepchild of CI.  Throughout the CI community, we have fairly consistently understaffed it.  We have sometimes tried to make it up as we go along.  We have tried to do it on the cheap.

Generally speaking, operators make bad analysts.  We are different kinds of people.  Operators are actors, doers, movers and shakers; we are quick, maybe a little impulsive, maybe a little “cowboy.”  Our best times are away from our desks.  We love the street.  Research and analysis is really not our thing—and when we have tried to do it, we have not been good at it.

True analysts are different.  They love it.  They are more cerebral, patient, and sedentary.  They find things we could not.  They write better.

A lot of CI programs in the past have tried to make operators double as their own analysts.  As a result, in the United States, CI analysis historically has been the weakest part of the business.  Professional CI analysts have been undervalued and underappreciated.

A good CI program will recruit and train true analysts in sizable numbers.  I do not think it would be excessive as a rule of thumb in a top notch CI service to be evenly divided between operators and analysts.  Very few of our US CI agencies come anywhere close to that ratio.

Wonderful things happen when good analysts in sufficient numbers pore over our DA reports, presence lists, SIGINT, audio and teltap transcripts, maps, travel data, and surveillance reports.  They find the clues, make the connections, and focus our efforts in the areas that will be most productive.

Many parts of the US CI community have gotten the message and have incorporated trained analysts into their operations, but others have not.  Across the board, we still have serious shortfalls in good, solid CI analysis.

The Sixth Commandment:  Do Not Be Parochial

More harm probably has been done to US CI over the years by inter-agency sniping and obstruction than by our enemies.  I remember when the CIA and the FBI did not even talk to each other—and both had disdain for the military services.  It is no wonder that CI was in shambles and that some incredibly damaging spies went uncovered for so long.

Occasionally in my career, I encountered instances of sarcasm or outright bad mouthing of other US Government agencies by my officers.  That kind of attitude and cynicism infected our junior officers and got in the way of cooperation.  These comments often were intended to flaunt our supposed “superiority” by demeaning the capabilities of the other organizations.  I dealt with these situations by telling the officers to “knock it off,” and I would encourage other CI supervisors around the community to do the same.

CI is so difficult, even in the best of circumstances, that the only way to do it is together.  We should not let personalities, or jealousies, or turf battles get in the way of our common mission.  Our colleagues in our sister services are as dedicated, professional, hardworking, and patriotic as we are, and they deserve our respect and cooperation.  The best people I have known in my career have been CI people, regardless of their organizational affiliation.  So let us be collegial.

The Seventh Commandment:  Train Your People

CI is a distinct discipline and an acquired skill.  It is not automatically infused in us when we get our wings as case officers.  It is not just a matter of applying logic and common sense to operations, but is instead a highly specialized way of seeing things and analyzing them.  CI has to be learned.

I do not know how many times in my career I have heard, “No, we do not really need a separate CI section.  We are all CI officers; we’ll do our own CI.”  That is a recipe for compromise and failure.

There are no substitutes for professional CI officers, and only extensive, regular, and specialized CI training can produce them.  Such training is expensive, so whenever possible we should do it on a Community basis to avoid duplication and to ensure quality.

CI is a conglomerate of several disciplines and skills.  A typical operation, for example, might include analysts, surveillance specialists, case officers, technical experts, and DA specialists.  Each area requires its own specialized training curriculum.  It takes a long time to develop CI specialists, and that means a sustained investment in CI training.  We are getting better, but we are not there yet.

The Eighth Commandment:  Do Not Be Shoved Aside

There are people in the intelligence business and other groups in the US Government who do not particularly like CI officers.  CI officers have a mixed reputation.  We see problems everywhere.  We can be overzealous.  We get in the way of operations.  We cause headaches.  We are the original “black hatters.”

Case officers want their operations to be bonafide.  Senior operations managers do not want to believe that their operations are controlled or penetrated by the opposition.  There is a natural human tendency on the part of both case officers and senior operations managers to resist outside CI scrutiny.  They believe that they are practicing good CI themselves and do not welcome being second-guessed or told how to run their operations by so-called CI specialists who are not directly involved in the operations.  I have seen far more examples of this in my CI career than I care to remember.

By the same token, defense and intelligence contractors and bureaucrats running sensitive US Government programs have too often tended to minimize CI threats and to resist professional CI intervention.  CI officers, in their view, stir up problems and overreact to them.  Their “successes” in preventing CI problems are invisible and impossible to measure, but their whistle blowing when problems are uncovered generate tremendous heat.  It is not surprising that they are often viewed as a net nuisance.

When necessary, a CI service has to impose itself on the organizations and groups it is assigned to protect.  A CI professional who is locked out or invited in only when it is convenient to the host cannot do his job.

My advice to my CI colleagues has always been this:  “If you are blocked by some senior, obtuse, anti-CI officer, go around him or through him by going to higher management.  And document all instances of denied access, lack of cooperation, or other obstruction to carrying out your CI mission.  If not, when something goes wrong, as it likely will in that kind of situation, you in CI will take the blame.”

The Ninth Commandment:  Do Not Stay Too Long

CI is a hazardous profession.  There should be warning signs on the walls:  “A steady diet of CI can be dangerous to your health.”

I do not believe anyone should make an entire, uninterrupted career of CI.  We all who work in CI have seen it:  the old CI hand who has gotten a bit spooky.  It is hard to immerse oneself daily in the arcane and twisted world of CI without falling prey eventually to creeping paranoia, distortion, warping, and over zealousness in one’s thinking.  It is precisely these traits that led to some of the worst CI disasters in our history.  Angleton and his coterie sadly succumbed, with devastating results.  Others in the CIA and elsewhere have as well.  The danger is always there.

My wife, who was working at the CIA when I met her, was well acquainted with this reputation of CI and the stories about its practitioners.  When I was serving overseas and received the cable offering me the position as Ted Price’s deputy in the new Counterintelligence Center, I discussed it with her that evening at home.  Her response, I thought, was right on the mark:  “Okay, but do not stay too long.”

Sensible and productive CI needs lots of ventilation and fresh thinking.  There should be constant flow through.  Non-CI officers should be brought in regularly on rotational tours.  I also believe it is imperative that a good CI service build in rotational assignments outside CI for its CI specialists.  They should go spend two or three years with the operators or with the other groups they are charged to protect.  They will come back refreshed, smarter, and less likely to fall into the nether world of professional CI:  the school of doublethink, the us-against-them mindset, the nothing-is-what-it-seems syndrome, or the wilderness of mirrors.

The Tenth Commandment:  Never Give Up

The tenth and last commandment is the most important.  What if the Ames mole hunters had quit after eight years instead of going into the ninth?  What if, in my own experience, we had discontinued a certain surveillance operation after five months instead of continuing into the sixth?  CI history is full of such examples.

The FBI is making cases against Americans today that involved espionage committed in the 1960s and 1970s.  The Army’s Foreign Counterintelligence Activity is doing the same.  The name of the game in CI is persistence.  CI officers who are not patient need not apply.  There is no statute of limitations for espionage, and we should not create one by our own inaction.  Traitors should know that they will never be safe and will never have a peaceful night’s sleep.  I applauded my CI colleagues in the FBI when I read not long ago of their arrest in Florida of a former US Army Reserve colonel for alleged espionage against the United States many years earlier.  They obviously never gave up.

If we keep a CI investigation alive and stay on it, the next defector, the next penetration, the next tip, the next surveillance, or the next clue will break it for us.

If there were ever to be a mascot for US counterintelligence, it should be the pit bull.

In Conclusion

These are my ten commandments of CI.  Other CI professionals will have their own priorities and exhortations and will disagree with mine.  That is as it should be, because as a country and as an Intelligence Community we need a vigorous debate on the future direction of US CI.  Not everyone will agree with the specifics, or even the priorities.  What we should agree on, however, is that strong CI has to be a national priority.  Recent news reports from Los Alamos, Washington, and elsewhere have again underscored the continuing need for CI vigilance.

Original Article by James M. Olson

James M. Olson served in the Directorate of Operations and is now on the faculty of the George Bush School of Government and Public Service at Texas A&M University.



Copyright © 2009-2015 StunGunMikes.com. Your Trusted Online Source for Stun Guns, Surveillance, and Spy Gear. All Rights Reserved.